Loading HuntDB...

F5 BIG-IP Cookie potentially reveal BigIP pool name, backend's IP address and port, routed domain.

Low
I
Informatica
Submitted None
Reported by reebak

Vulnerability Details

Technical details and impact analysis

Information Disclosure
Hi Team, I hope everything is well. I am Kabeer Saxena a Security Researcher and I have found a bug Issue: ---------- F5 BIG-IP Cookie Remote Information Disclosure Vulnerable IP: ---------------- ██████:443 Certificate Information: ==X509v3 Subject Alternative Name:== ==DNS:████████== Summary: ------------ Team with the help of Shodan[https://www.shodan.io/host/███████] I found that the IP was assigned with F5 Big IP cookie, The last request captured was of 20th May 2021 and the request was: ``` nginx1.14.2 HTTP/1.1 200 OK Server: nginx/1.14.2 Date: Thu, 20 May 2021 14:46:00 GMT Content-Type: text/html;charset=ISO-8859-1 Content-Length: 2257 Connection: keep-alive Set-Cookie: JSESSIONID=██████████; Path=/informaticaCSM; HttpOnly Set-Cookie: BIGipServercsm-pool=██████████; path=/; Httponly; Secure ``` Where we can see BIGipServercsm-pool=███████ cookie. The f5 Big-IP cookies potentially reveal BigIP pool name, backend's IP address and port, routed domain. Team When I tried visiting the URL it redirected me to the network.informatica subdomain where BIGIP cookie has different name==[BIGipServernetwork-int-pool]==and was encrypted ,So I took the cookie from the Shodan History which is ==BIGipServercsm-pool=█████== Image of the shodan request with IP and Certificate : https://ibb.co/TctrWKB The remote host ███████:443 appears to have an F5 BIG-IP load balancer(or behind load balancer) and the unencrypted cookie may disclose BigIP pool name, backend's IP address and port, routed domain. The remote host appears to be an F5 BIG-IP load balancer. The load balancer encodes the IP address of the actual web server that it is acting on behalf of within a cookie. Additionally, information after 'BIGipServer' is configured by the user and may be the logical name of the device. These values may disclose sensitive information, such as internal IP addresses and names. Proof-Of-Concept: -------------------- observe the cookies in the following request a Big-IP cookie represents [encoded IP].[encoded port].0000. I followed https://sra.io/blog/finding-and-decoding-big-ip-and-netscaler-cookies-with-burp-suite/ for decoding the cookie and the final IP pool name and port decoded is ==█████== Remediation: ----------------- Encrypting the cookies from BigIP I hope you find the report useful. Thankyou for your time Related reports, best practices -------------------------------- https://support.f5.com/csp/article/K14784?sr=45997495 http://www.systemadvise.com/2016/11/f5-big-ip-cookie-remote-information.html https://www.rapid7.com/db/modules/auxiliary/gather/f5_bigip_cookie_disclosure ## Impact Attacker can leaks backend information (pool name, backend's IP address and port, routed domain) through cookies inserted by the BigIP system.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure